HR Hero Your Employment Law Resource
 

event management

Results 101 - 125 of 253Sort Results By: Published Date | Title | Company Name
Published By: Kronos     Published Date: Jul 26, 2017
Employees and managers face challenges and pressures each day that make work unnecessarily complex and unproductive. This complexity can stand in the way of achieving business goals and prevent employees from delivering the value they want to bring to the workplace. This Coleman Parkes and Workforce Institute at Kronos report highlights key findings and discusses the roles leadership, technology, and talent management play in optimizing workforce engagement for sustained competitive advantage. Learn about the challenges, opportunities, and costs of employee engagement — or lack thereof — in organizations today, and how small changes can go a long way toward engaging employees and ultimately drive business success.
Tags : 
efficiency, employee engagement, leadership, talent management, workforce
    
Kronos
Published By: Shell     Published Date: Aug 15, 2018
Shell Lubricants technical experts suggested that the company implement a field trial to compare the fuel economy benefits of Shell Rimula R4 L 15W-40 to Shell Rimula R5 LE 10W-30. Six Volvo trucks running more or less the same duties were selected for the trial, which took place over a period of six months. Three trucks started with Shell Rimula R4 L 15W-40, the other three with Shell Rimula R5 LE 10W-30. After 3 months, this was switched to prevent any possible truck-specific deficiencies. Throughout the trial, fuel consumption was closely monitored by Volvo Fleet management on-board computers.
Tags : 
shell, efficient, fleets, fuel economy, oil drain intervals, maintenance, trucking
    
Shell
Published By: Riverbed     Published Date: Nov 02, 2016
When apps run efficiently, employees are more likely to use them. The promise of unified communications (UC) is that it is supposed to increase efficiencies and make internal operations more seamless. But that only happens when it’s working properly. According to Robin Gareiss, president and founder of Nemertes Research, “Companies devote 33% more IT staff to managing IP telephony and 31% more to UC when they don’t use monitoring tools. The tools are instrumental to identifying, isolating, and resolving performance issues—and preventing them from happening again. When apps run efficiently, employees are more likely to use them.” That’s one reason 36% more people actually use UC in large companies that use monitoring tools. Join Robin Gareiss, president and founder, Nemertes Research and David Roberts, director of product management, Riverbed, as they explore the different approaches to monitoring UC—network probes vs endpoint telemetry—and why taking a combined approach hel
Tags : 
    
Riverbed
Published By: Logrhythm     Published Date: Feb 24, 2016
This research will help you to: - Select an appropriate SIEM solution based on vendor research. - Create an implementation roadmap. - Define your SIEM architecture. - Measure the continued value of your SIEM.
Tags : 
security, security application, siem, siem architecture, it security managers
    
Logrhythm
Published By: Logrhythm     Published Date: Feb 24, 2016
This guide focuses solely on SIEM solutions that are available as appliances that include both the hardware and software needed to deploy them.
Tags : 
security, application security, siem, siem solutions
    
Logrhythm
Published By: McAfee EMEA     Published Date: Nov 15, 2017
In response to an increasingly complex IT ecosystem and expanding attack surface, Intel Security offers a unified threat defense lifecycle. Intel Security delivers an integrated, connected architecture that dramatically increases speed and capacity of organizations to prevent and respond to attacks. Our architecture reduces complexity and improves operational efficiency, providing critical integrated, adaptive, and orchestrated intelligence and response capabilities. This empowers customers to block threats more effectively, identify compromises, and implement quick remediation and stronger countermeasures.
Tags : 
security information, event management, orchestration, surface, intel security
    
McAfee EMEA
Published By: HP     Published Date: Aug 03, 2009
The usual cure for exploding file volumes is to add more general purpose file servers. That strategy eventually leads to server sprawl, which brings with it more management complexity, stranded disk capacity, wildly differing storage utilization rates and slower file access. Network-attached storage (NAS) appliances can add file serving capacity that's more easily managed, shareable, more scalable and more efficient than a sprawl of general purpose servers. Read this online article to learn about three basic considerations that can help simplify your NAS buying decision.
Tags : 
nas, network-attached storage, servers
    
HP
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Help Desk is a robust help desk solution for small to medium-sized businesses with complex network environments. It provides a powerful combination of management features integrated with a best-of-breed IT help desk platform. Use the help desk software to manage the ticket system workflows, dashboards, reporting and end-user self-service portals. Use the embedded management features within the help desk platform to proactively manage network events, desktops, servers and applications as well as resolve issues faster and more effectively.
Tags : 
help desk, active directory, resolve issues, reports, windows, iphone, priorituze requests, auto escalation
    
Dell Software
Published By: Marketo     Published Date: Jun 08, 2017
Read this complimentary copy of the SiriusView: Marketing Automation Platforms 2017 and learn more about Marketo’s key differentiators including its native multi-channel experience, live event management, and content recommendation functionalities. Marketo's powerful marketing automation capabilities and seamless CRM integrations are complemented by our LaunchPoint ecosystem featuring over 500 technology and service providers that offer best-of-breed solutions for today’s marketers. The full report includes: Market evaluation and analysis of 9 marketing automation platform vendors Insights for selecting a vendor based on your organization's requirements Opportunities and challenges faced when deploying marketing automation platforms
Tags : 
automation, security process, virtualization, standardization, configuration management, it automation, circle it
    
Marketo
Published By: Marketo     Published Date: Jun 08, 2017
As a marketer, you face daunting expectations and goals. You are probably expected to generate successful outcomes in less time, and in a digital age where everything can be measured, you probably feel increased pressure to illustrate the impact you are driving. But without the right tools and processes in place, hitting your goals and demonstrating the results is difficult, time-consuming, and stressful! Marketing automation can help you scale your programs, deliver more personalized and targeted communications, align with sales, and measure effectiveness. Download this ebook to explore 10 reasons you may want to consider marketing automation to support you through the sales cycle, from attracting and engaging leads, to closing the deal.
Tags : 
program automation, multi channel, sales and enablement, predictive lead scoring, visual personalization, design, live event management
    
Marketo
Published By: Marketo     Published Date: Mar 18, 2019
The role of marketing is constantly evolving. More than ever, marketing has to prove its impact on the success of the business. Outside executives often believe that marketing exists solely to support sales, or as an arts function that hosts company events and puts logos on t-shirts. With the pressure increasing, the growing imperative for marketers to prove their worth has arrived. It’s time for marketers to take control over the revenue process, earn the respect of their organizational peers, and earn a seat at the table. What must marketers do to be seen as an integral part of the machine that drives revenue and growth? Download The Definitive Guide to Marketing Metrics and Analytics to learn about: Establishing a culture of accountability Planning programs with ROI in mind Creating a framework for measurement Embracing revenue performance management Mastering the art of forecasting Building dashboards to inform complex decisions Implementation across teams, tactics, and technolog
Tags : 
    
Marketo
Published By: EMC Corporation     Published Date: Mar 20, 2014
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : 
emc, siem, security transformation, malware detection, malware threats, big data security platform, incident detection, advanced security analysis
    
EMC Corporation
Published By: Marketo     Published Date: May 18, 2017
Marketing automation is a technology solution that helps enable the seeding, creation, nurturing and acceleration of demand among prospects and customers (see the brief “Marketing Automation Platforms Defined”). Given that marketing automation platforms (MAPs) are an essential component of every b-to-b organization’s marketing infrastructure, organizations understand the need for these platforms, as well as their internal need for optimized processes and skills to leverage them. However, while most b-to-b marketers understand the value of lead nurturing, lead scoring/prioritization, program and tactic level reporting, and the SiriusDecisions Demand Waterfall®, they often struggle to operationalize these processes with MAPs, which is why selecting the right MAP is imperative. In this SiriusView, we describe MAP providers’ differences to help organizations identify which MAPs best meet their needs.
Tags : 
program automation, multi channel, sales and enablement, predictive lead scoring, visual personalization, design, live event management
    
Marketo
Published By: RSA     Published Date: Aug 28, 2014
Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Tags : 
data loss, prevention, risk management, dlp, governance, framework
    
RSA
Published By: Mimecast     Published Date: Oct 25, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, data loss, data leaks prevention, dlp, risk, compliance, information security, email management
    
Mimecast
Published By: Webroot UK     Published Date: Sep 05, 2013
Webroot SecureAnywhere Business - Endpoint Protection offers a revolutionary approach to malware protection. It brings together Webroot's innovative file pattern and predictive behavior recognition technology, with the almost limitless power of cloud computing, to stop known threats and prevent unknown zero-day attacks more effectively than anything else. Read this white paper to learn about ultimate performance and minimal management security software from Webroot.
Tags : 
webroot, secureanywhere, business, software, security software, revolutionary software, predictive behavior, known threats
    
Webroot UK
Published By: GFI Software     Published Date: Mar 21, 2011
This white paper examines the necessary requirements to adhere to PCI DSS, the implications of non-compliance as well as how effective event log management and network vulnerability management play a key role in achieving compliance.
Tags : 
gfi, pci dss, credit card, event log management, network vulnerability management, compliance
    
GFI Software
Published By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : 
ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager
    
IBM
Published By: Inovis     Published Date: Aug 06, 2007
When companies adopted Just-In-Time (JIT) tactics, they did so primarily to reduce inventory costs. For the most part, this strategy worked. Reducing stocks of raw materials, parts, assemblies and finished goods reduces carrying costs, allowing companies to invest the freed-up funds in more productive assets and projects.
Tags : 
supply chain, scm, supply chain management, inovis, spend management, cost control, inventory, inventories
    
Inovis
Published By: Progress Software Corporation CEP     Published Date: Aug 03, 2009
Forrester Research has named Apama as a standout leader in the complex event processing (CEP) platform market in The Forrester Wave: Complex Event Processing Platforms, Q3 2009 Report. The Report evaluated nine CEP platform vendors based on a comprehensive set of evaluation criteria.
Tags : 
progress software, idc, complex event processing, apama, business activity monitoring (bam), business process management, bpm, systems and operations management
    
Progress Software Corporation CEP
Published By: Progress Software Corporation CEP     Published Date: Jul 14, 2009
In the transport and logistics market where timing is critical, a matter of minutes can make or break a performance-based contract. Your success will depend on your organization's ability to visualize, monitor and act on internal events and external events that effect your operations.
Tags : 
progress software, idc, complex event processing, apama, transport, logistics, kpi, greening
    
Progress Software Corporation CEP
Published By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire provides IT organizations with enhanced file integrity monitoring, configuration assessment and log management that automates continuous PCI compliance.
Tags : 
tripwire, pci compliance, file integrity monitoring, configuration assessment, log management, malware, security, event management
    
Tripwire, Inc
Published By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire Enterprise combines real-time change detection, comprehensive configuration auditing, continuous policy compliance management, and rapid configuration remediation in a single solution. By integrating these Tripwire solutions, you can correlate all suspicious events with changes to take control of threats across all events and changes.
Tags : 
tripwire enterprise, log and event management, security, compliance, configuration audit, total cost of ownership, tco, siem
    
Tripwire, Inc
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
NERC enforces comprehensive reliability standards for planning and operating the collective bulk power system, including the Critical Infrastructure Protection (CIP) Cyber Security Standards.
Tags : 
tripwire, nerc compliance, it security, automation, cip, cyber security, reliability standard, log
    
Tripwire, Inc
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
Unlike others, Tripwire solutions identify the events that matter most-those that pose the real security risks or take you out of compliance. And they help you discover those events immediately, while you can still contain the damage.
Tags : 
tripwire, pci compliance, business continuity, log, event management, it security, compliance automation, log center
    
Tripwire, Inc
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.